Skip to main content
TrustRadius
CrowdStrike Falcon

CrowdStrike Falcon

Overview

What is CrowdStrike Falcon?

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents,…

Read more
Recent Reviews
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Endpoint Detection and Response (EDR) (69)
    9.4
    94%
  • Malware Detection (69)
    9.3
    93%
  • Infection Remediation (67)
    8.9
    89%
  • Centralized Management (70)
    8.5
    85%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Falcon Pro

$6.99

Cloud
per endpoint/month (for 5-250 endpoints, billed annually)

Falcon Enterprise

$14.99

Cloud
per endpoint/month (minimum number of endpoints applies)

Falcon Premium

$17.99

Cloud
per endpoint/month (minimum number of endpoints applies)

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://www.crowdstrike.com/endpoint…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Features

Endpoint Security

Endpoint security software protects enterprise connected devices from malware and cyber attacks.

8.8
Avg 8.5
Return to navigation

Product Details

What is CrowdStrike Falcon?

CrowdStrike offers cloud-delivered endpoint protection. CrowdStrike aims to revolutionize endpoint protection by unifying next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent.

The vendor states many of the world’s largest organizations use CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.

CrowdStrike Falcon Features

Endpoint Security Features

  • Supported: Anti-Exploit Technology
  • Supported: Endpoint Detection and Response (EDR)
  • Supported: Centralized Management
  • Supported: Infection Remediation
  • Supported: Vulnerability Management
  • Supported: Malware Detection

CrowdStrike Falcon Video

CEO George Kurtz discusses challenges organizations face using legacy cybersecurity solutions & how easy, fast & effective the CrowdStrike Falcon platform is by comparison.

CrowdStrike Falcon Integrations

CrowdStrike Falcon Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationApple iOS, Android
Supported LanguagesEnglish, Japanese

Frequently Asked Questions

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance impact, no additional agents, hardware, scheduled scans, firewall exceptions or admin credentials.

Reviewers rate Endpoint Detection and Response (EDR) highest, with a score of 9.4.

The most common users of CrowdStrike Falcon are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(234)

Attribute Ratings

Reviews

(1-25 of 73)
Companies can't remove reviews or game the system. Here's why
Humayoon Khan | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • AI / ML based malicious activity detections
  • Detection information presented clearly and concisely on dashboard
  • Easy filtering of detections on hostname, detection name, severity, date, time, hash, technique etc
  • traces full process chain instead of just showing the source file or script which really helps in tracing the main security concern of machine
  • If some malicious app uses microsoft's signed binary like onedrive, cmd, wscript CrowdStrike would tag the microsoft binary as malicious and fails to provide the actual file that tried to execute these.
  • For example if a
  • malware.exe tries to run this command
  • cmd /c bitsadmin
  • CrowdStrike would tag cmd or bitsadmin as malicious and does not mention malware.exe at all sometimes
  • There are two different dashboards (updated and deprecated) which causes confusion among my team, all must be on same page and use single dashboard.
  • Support is very slow in responding to problems and depend on automated bots which really frustrates when a major issue arises.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Network segmentation for host and servers using the firewall.
  • USB block by the sensor.
  • IDP alerts from our domain and different identities
  • Support response.
  • Sensor stability, sometimes the sensor fails on computers
  • Improve menus
Score 10 out of 10
Vetted Review
Verified User
  • Prompt response
  • Reliable follow up
  • High detection ability
  • Enhancement of Japanese language
  • Screen configuration that requires no screen transitions as much as possible
James Dilley | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • CrowdStrike Falcon's next-gen endpoint protection consistently outperforms traditional solutions.
  • The cloud-native architecture ensures seamless scalability and real-time updates, eliminating the need for manual interventions.
  • CrowdStrike Falcon's threat intelligence and hunting capabilities are unparalleled.
  • The advanced features may pose a learning curve for users unfamiliar with modern cybersecurity tools.
  • A more transparent pricing model could assist in budget planning.
  • Expanding compatibility with a broader range of security solutions would be advantageous.
Score 8 out of 10
Vetted Review
ResellerIncentivized
  • Known malware detection.
  • Software detection with malicious behavior.
  • Identification of processes with anomalous behavior.
  • User management in cases where the service is provided as an MSP.
  • Clarity in console menus.
  • Integration with third-party EPP.
November 06, 2023

CrowdStrike Falcon Review

Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Detects suspicious activity
  • Shows exact location and processes involved in suspicious activity
  • Isolate computers with suspicious activity
  • Setting up on MacOS was more complicated than expected (as kernel extensions were being phased out)
  • Remediation is not always as automated as some other systems (e.g. Malware Bytes)
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Endpoint Detection and Response
  • Great communication to the security operations teams for triaging a security event
  • Customizable policies which can be globally applied
  • Ease of integration with SIEM
  • Ability to query endpoint logs within the Falcon portal itself
  • Sandbox can get better in my opinion.
  • Detection of source of infection in case of lateral movements recommended
  • Browser based logs/ DNS queries for getting to the root of the issue
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • MFA Everywhere to protect our systems from remote login connections.
  • Realtime endpoint protection that is updated regularly without intervention from our system administration team.
  • 24 x 7 x 365 monitoring of the system to provide protection at all times.
  • Walkthroughs of new features when added to the console.
  • Better instructions on how and where to add or change policies for various tools.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Protection of end points.
  • Protection of user identities.
  • Providing quick response to any identified security issues.
  • CrowdStrike can be on the more expensive side of end point and identity management, but it's worth it.
Score 9 out of 10
Vetted Review
ResellerIncentivized
  • It helps us to stop security breaches as well as prevent all types of attacks (including malwares, ransomwares and many other such attacks)
  • It helps in Adversary Emulation Exercise
  • it helps in Red Team / Blue Team Exercise
  • should improve threat visibility
  • its overall TCO should be reduced
  • seamless integration with solutions like SIEM
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Staff did a great job pointing our IT workers to areas that needed remediation.
  • CrowdStrike Falcon Endpoint consistently blocks incursions from compromised websites and prevents PUPs from installing
  • Complete Staff is very attentive and makes whitelist changes quickly which allows our staff to be productive.
  • The Dashboard can become overwhelming at times, too much information to absorb
  • Computers that may have made it out into the field without the endpoint sensor are very difficult to find
  • As with all systems that rely on machine learning false positives occurr
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Runs on clients without causing application issues
  • matches files patterns/behaviors to look for unknown attacks
  • contains potentially infected hosts
  • The user interface is terrible
  • permit users to see licensed products in the console
  • less false positives. files such as Malwarebytes scanning modules should be known as safe
  • make it easier to create scanning exclusions that actually work
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Efficiently picking up and preventing malware threats on endpoints
  • Prompt notification capabilities on any issues
  • Ability to "set and forget" with minimal maintenance required
  • Falcon Spotlight integrations with automatic patching solution would be a good feature
  • LogScale with SIEM functionalities would be an added feature
  • Simplified one dashboard with all high-level information
Itumeleng Thekiso | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Host machine vulnerability detection
  • Threat mitigation
  • Activity monitoring
  • Constantly releases alerts or notifications
  • Behavourial analytics
  • Endpoint manual scan
  • Malware analysis needs improving
  • Requires some level of expertise to use its features
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Remote session
  • Remediation killing quarantining the process/files
  • Graphical process tree
  • Splunk backend searches with all details
  • Various dashboards
  • Suppression to weed out false positives
  • Can have some AI incorporated
  • Support can be introduced
  • Searching the related events require splunk knowledge which can be a show stopper
Return to navigation